How Do I Protect My Intranet?

Submitted by: Herry Willson

An intranet is a network or a set of interconnected computer networks within the same institution. Like all networks, the fundamental purpose of the Intranet is to share information and resources among the various users of the same. What distinguishes an Intranet from other types of networks is the protocol used for communication between computers, which is the TCP/IP, the same used on the Internet. With an intranet which can be considered a small-scale Internet.

An intranet can set within the corporate earnings-related information about the organization and its projects, employees, training, inventory, etc., Encourages the application of group work, discussion boards, marketing plans , project management and design and manufacturing activities, the communications are bidirectional, allowing communication between teams, between departments, offices located in different premises, and, of course, there is also out of doors communication (Internet), improving relations external, national or international.

The objectives of the Intranet is to get a better and more efficient communication and collaboration between managers, employees and even, if desired, external collaborators.

For all these reasons and taking into account the sensitive corporate information that usually appears in the corporate intranet, deserves special attention on the safety stop them.

[youtube]http://www.youtube.com/watch?v=zzeMXZYmnwI[/youtube]

Any Intranet is vulnerable to attacks by people intending to destroy or steal corporate data. The unlimited nature of the Internet and TCP/IP to a company exposed to such attacks.

Intranets require various safety measures, including combinations of hardware and software that provides traffic control, encryption and passwords to validate users and computer security, and software tools to prevent viruses, blocking unwanted sites, and control traffic.

The main problem is that although an Intranet is a private network that is accessible by well-defined and limited group, it is not exempt from attacks that could compromise the information handled, since most of these are caused by their own users.

Most computer security statistics indicate that about 80% of computer-related fraud from internal users, so intranets are the most vulnerable to such attacks.

The measures of Information Security are broadly as follows:

Creating an Access Control

The purpose of this procedure aims to establish rules governing the management of passwords and access privileges to information systems, applications and data. Various security techniques, including encryption, help ensure that passwords are kept safe. It is also necessary to require that passwords be changed frequently, not easily guessed or common dictionary words, and not simply reveal. Authentication is the extra step to verify that the person giving the password is the person authorized to do so.

Implement technical measures to prevent the spread of virus by the computer system.

To protect sensitive corporate information, and to ensure that the pirates would not hurt the computer systems and data, the company will implement all measures within its power as the use of safety barriers called firewalls that protect a Intranet Internet.

Another technical measure of fundamental importance and is perhaps the most widespread is the use of antivirus software, as well they should be run on individual workstations within the Intranet because it may be possible to introduce a virus into the Intranet for floppy disks, for example. In addition to virus protection, virus can detect and remove any viruses found.

As you can see there are several different methods for deploying a secure Intranet, but neither alone can provide sufficient security, but it is the combination of all these elements together with a successful security policy planning, specific requirements and the characteristics of the company, are those that could help define an effective security strategy without all this interrupt or hinder the activities of users who are for the Intranet is finally built.

About the Author: SupportMart ensures availability of online technical support 24 hours a day and seven days a week just by click of a mouse and provides all sort of supports for operating systems, virus removal.Log on to

supportmart.net

Source:

isnare.com

Permanent Link:

isnare.com/?aid=719465&ca=Internet

0